Hash functions

Results: 1148



#Item
771Advanced Encryption Standard / Cryptographic hash functions / FIPS 140-2 / HMAC / Crypt / SHA-1 / Symmetric-key algorithm / Key size / Microsoft CryptoAPI / Cryptography / Hashing / Cryptographic software

Symantec Cryptographic Module 1.0 FIPS[removed]Non-Proprietary Security Policy 1.0 Symantec Cryptographic Module

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
772Error detection and correction / Search algorithms / SHA-2 / SHA-1 / MD5 / Collision / Hash function / Crypt / Digital signature / Cryptography / Cryptographic hash functions / Hashing

Microsoft Word - LE-Hashing-Analysis-WERB-r10.doc

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2006-06-05 17:00:20
773Cryptography standards / Cryptographic hash functions / Computing / FIPS 140-2 / HMAC / SHA-1 / SHA-2 / FIPS 140 / Windows Mobile / Cryptography / Error detection and correction / Cryptographic software

Mobile Armor™ Crypto Module[removed]Security Policy FIPS 140-2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
774Hashing / Cryptographic hash functions / Cryptographic software / FIPS 140-2 / HMAC / FIPS 140 / SHA-2 / SHA-1 / BlackBerry Enterprise Server / Cryptography / Error detection and correction / Cryptography standards

Microsoft Word - TID[removed]140sp591.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-08 00:00:00
775Cryptographic hash functions / SHA-2 / United States Department of Housing and Urban Development

SHA COMMUNITY NEWSLETTER Summer 2012 | Volume 12, Issue 3 THE DIRECTORS CHAIR As the HOT summer weather sets in I would like to take this opportunity to bring to all our residents attention the

Add to Reading List

Source URL: www.shanc.org

Language: English - Date: 2013-01-29 14:29:49
776Cryptographic hash functions / Search algorithms / Bloom filter / Hash function / Fingerprint / Crypt / Rabin fingerprint / SHA-1 / Feature selection / Cryptography / Hashing / Error detection and correction

Chapter 8 DATA FINGERPRINTING WITH SIMILARITY DIGESTS Vassil Roussev Abstract

Add to Reading List

Source URL: roussev.net

Language: English - Date: 2013-07-17 18:45:01
777Search algorithms / Error detection and correction / Hash function / Crypt / Secure Hash Standard / SHA-2 / NIST hash function competition / Cryptography / Cryptographic hash functions / Hashing

mstockstill on PROD1PC70 with NOTICES Federal Register / Vol. 72, No[removed]Tuesday, January 23, [removed]Notices or through the email hotline – vietnam– texapp-monitor–[removed]. PRODUCT COVERAGE: The

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:28:18
778Cryptography standards / Hashing / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / SHA-1 / Block cipher / Key size / Padding / Cryptography / Cryptographic hash functions / Error detection and correction

FIPS140-2 Security Policy for IBM CryptoLite in C (CLiC) FIPS140-2 Security Policy for CryptoLite in C (CLiC)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
779Cryptographic hash functions / Electronic commerce / SHA-1 / SHA-2 / Public key certificate / Public key infrastructure / Sha / Cryptography / Public-key cryptography / Key management

Status Update for DTrade PKI/SHA-256 Digital Certificate Upgrade Industry Notice: DTrade PKI/SHA-256 Digital Certificates DDTC is upgrading the DTrade system to ensure compliance with the use of Access Certificates for E

Add to Reading List

Source URL: pmddtc.state.gov

Language: English - Date: 2013-11-12 10:52:02
UPDATE